Pass the Cyber AB CMMC CMMC-CCA Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

A Lead Assessor is preparing to conduct a Level 2 Assessment for an OSC. The assessor already determined the assessment scope and systems included. In addition, the assessor requests:

    Results of the most recent OSC self-assessment or any pre-assessments by an RPO,

    The System Security Plan (SSP), and

    A list of all OSC staff who play a role in in-scope procedures.

Based on this information, which item would the assessor MOST LIKELY request when preparing to conduct a Level 2 Assessment?

Options:

A.

A list of objectives


B.

A manual for each system


C.

A preliminary list of the anticipated evidence


D.

A list of assets that are determined to be out-of-scope


Expert Solution
Questions # 12:

A company seeking Level 2 certification has several telecommunications closets throughout its office building. The closets contain network systems and devices that are used to transmit CUI. Which method would be BEST to ensure that only authorized personnel can access the network systems and devices housed within the closets?

Options:

A.

Label the door with “Authorized Personnel Only” and maintain an authorized personnel list.


B.

Install locks with badge readers on the closet doors and maintain an authorized list.


C.

Install security cameras to monitor closet entrances and maintain an authorized personnel list.


D.

Install keypad door locks on the closet doors and only provide the code to IT department personnel.


Expert Solution
Questions # 13:

The assessor begins the assessment by meeting with the client’s stakeholders and learns that multiple subsidiaries exist. In order to perform a complete assessment, the assessor must review documents from multiple entities as multiple, corresponding Commercial and Government Entity (CAGE) codes were provided. Which of the following entities may receive certification as a result of this?

Options:

A.

HQ organization


B.

HQ organization and Host unit


C.

Host unit and Supporting Organizations/Units


D.

HQ organization, Host unit, and Supporting Organizations/Units


Expert Solution
Questions # 14:

The Lead Assessor is planning to conduct an assessment for an OSC. The Assessor has been given a preliminary asset inventory list by the OSC. How would the Lead Assessor determine if any assets are out-of-scope for the assessment?

Options:

A.

All assets in an OSC’s inventory fall within the scope of the assessment and, as such, should be assessed against the CMMC practices.


B.

None of the assets in an OSC’s inventory fall within the scope of the assessment and, as such, should not be assessed against the CMMC practices.


C.

Assets cannot process, store, or transmit CUI because they are physically or logically separated from CUI assets, or they are inherently unable to do so.


D.

Out-of-Scope Assets can process, store, or transmit CUI because they do not need to be physically or logically separated.


Expert Solution
Questions # 15:

While conducting a Level 2 Assessment, the Assessment Team begins reviewing assessment objects. The team identifies concerns with several of the objects presented. Which artifacts would require the MOST verification?

Options:

A.

Current artifacts produced by individuals performing the work


B.

Artifacts created 18 months ago by individuals performing the work


C.

Current artifacts produced by individuals that work for a separate entity of the company


D.

Artifacts created 18 months ago by individuals that work for a separate entity of the company


Expert Solution
Questions # 16:

The OSC’s network consists of a single network switch that connects all devices. This includes the OSC’s OT equipment, which processes CUI. The OT controller requires an unsupported operating system.

What can the Lead Assessor BEST conclude about the overall compliance with MA.L2-3.7.1: Perform Maintenance?

Options:

A.

It is MET only if every asset that is not a Specialized Asset is maintained.


B.

It is MET only if the environments are demarcated on the baseline diagram.


C.

It is NOT MET because industrial equipment should not be processing CUI.


D.

It is NOT MET because the OSC has not managed the risk of a CUI system being outdated.


Expert Solution
Questions # 17:

A company has five individual buildings in one business complex. During the assessment, the Assessment Team sees people entering and exiting the buildings and notices that none of the buildings have keypads or locks. The Assessment Team needs to determine how physical access is managed and controlled.

Which artifact BEST describes how access to these buildings is managed?

Options:

A.

System Security Plan (SSP)


B.

Personnel Access List


C.

Identification and Authorization Plan


D.

Physical and Environmental Protection Policy


Expert Solution
Questions # 18:

A CCA is prohibited from doing which of the following?

Options:

A.

Verifying key internal system boundaries


B.

Determining if physically separated assets contain CUI


C.

Ensuring the external system boundary is fully defined


D.

Examining whether communications are monitored at the external system boundary


Expert Solution
Questions # 19:

When a new employee is issued a laptop, only the user’s credentials need to be set up. According to the IT department, the IT manager is the only person who can change laptop setup and user privileges. What documentation should be examined to determine if this is the case?

Options:

A.

System audit logs


B.

Inventory records


C.

Acceptable use policy


D.

Remote access procedures


Expert Solution
Questions # 20:

An OSC creates standard user accounts with limited capabilities and administrator accounts with full system access. A standard user initiates the uninstall of the anti-virus software, which is organizationally defined as a privileged function. Which of the following would indicate AC.L2-3.1.7: Privileged Functions is properly implemented?

Options:

A.

The antivirus software is not uninstalled.


B.

The antivirus software is successfully uninstalled.


C.

The antivirus software is not uninstalled, and the attempt is captured in an application audit log.


D.

The antivirus software is successfully uninstalled, and the event is captured in an application audit log.


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions